Description
An unauthenticated remote attacker can use firmware images to extract password hashes and brute force plaintext passwords of accounts with limited access.
Problem types
CWE-327 Use of a Broken or Risky Cryptographic Algorithm
Product status
0.0 (custom)
0.0 (custom)
0.0 (custom)
0.0 (custom)
Credits
Deutsche Telekom Security (DT Security)
References
certvde.com/en/advisories/VDE-2025-079/
certvde.com/en/advisories/VDE-2025-096/
janitza.csaf-tp.certvde.com/.../white/2026/vde-2025-079.json
weidmueller.csaf-tp.certvde.com/...te/2026/vde-2025-096.json